Re: [Doh] Talking to my resolver

Ben Schwartz <bemasc@google.com> Mon, 18 March 2019 22:01 UTC

Return-Path: <bemasc@google.com>
X-Original-To: doh@ietfa.amsl.com
Delivered-To: doh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 570511311AD for <doh@ietfa.amsl.com>; Mon, 18 Mar 2019 15:01:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.501
X-Spam-Level:
X-Spam-Status: No, score=-17.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id plz-fKaebbo9 for <doh@ietfa.amsl.com>; Mon, 18 Mar 2019 15:01:07 -0700 (PDT)
Received: from mail-it1-x130.google.com (mail-it1-x130.google.com [IPv6:2607:f8b0:4864:20::130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 96CC01311A8 for <doh@ietf.org>; Mon, 18 Mar 2019 15:01:07 -0700 (PDT)
Received: by mail-it1-x130.google.com with SMTP id w124so5407699itc.0 for <doh@ietf.org>; Mon, 18 Mar 2019 15:01:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=0n/hoLXZeyNCDE2+xZQul5BM5+nOCcF/fSYG5hWfFkI=; b=C950sSVewHQJtd+BnJS1E/cRHQVLLxSp8h8KJbVbWpDA07lYD23g3J8yZJvYx/nc4U y4quebr4sxzmQldHRXb7kdituwbTU7VvwoF8Qk5iiqdNFaGk2RXUsh3ZhKR6QnR9eORd befjEzLbUC1Makaj3PiWUoA8BtusncBX+BeRHNq0gqZ3dC8pogDBMGGgZ4EzjO/lgRNP Lp+08yGhax56Rw7vsFsjdKBNFkIqMCYaIMlbMUZAntzEXGvU0RTM2br6DiAT54XlK1xF biNYUPTGOlw37qgGJcpjped8gORb0GUjrVz5Py7BFgATmUPrKLUPXF1tR5GeyMyNKvq6 /eBA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=0n/hoLXZeyNCDE2+xZQul5BM5+nOCcF/fSYG5hWfFkI=; b=pyPckIssk+lb1hlze+HqlAmm0btvjw9kkEGCG0VqdTs3gTLT1yMkFLd8j8oATP7wji zXIGaYFQcXprcWjFbEPc9652hB8vUzBwB8zGbajKwA4bAasAfMEyotz2W5AE6UlRTPQI WHJVTM5BhHhiD4yHtHTP/FVEPGw5QRbjy9QtHXAx2fG1QvyUMPBEkdKI/CB+7vlUiDNs pxpxNClAtBO5N5NnyP/D8vztsNSKuY/ECJrPOkRUHoxd5zG06twcJtJM9FFYObAaDQxW ajKAuBTQXctOr3kdGvl3OjJCXPlGWg3YHz4Z/ZjNhqcxY8xW0Rqb0bhQa2mdfM61Emx7 VKuw==
X-Gm-Message-State: APjAAAXCqQcHRGALcnnLasSQpcoHGuPHvBdydIknxKetNQfH3j0Fb8IQ o6uyWE2coQt7FqetLjRvVuTBzu/USv/mJFxZi9zFoA==
X-Google-Smtp-Source: APXvYqwEcf4KNFgJJOjwXhRzFuJsny5SVCI1TWakAhVU3Qe4TosHnaoimvcQjIY9XfgAoyqOkBKy9i5fSRgPF5Q1pcc=
X-Received: by 2002:a05:660c:683:: with SMTP id n3mr725767itk.70.1552946466773; Mon, 18 Mar 2019 15:01:06 -0700 (PDT)
MIME-Version: 1.0
References: <CAHbrMsCNyeabhk0sVexOHVedVkgG2dvV9T8wWL++om5juAUvEw@mail.gmail.com> <b3c252eb-f8de-42f7-bedd-ef23375b5325@www.fastmail.com> <4de48a75-955d-89e3-7da3-4a1876edc53a@riseup.net> <bc485de8-0fa9-44a9-96ff-2a694e45f7b3@www.fastmail.com> <72a7be2c-918a-c2ab-0df8-dab6253532e5@riseup.net>
In-Reply-To: <72a7be2c-918a-c2ab-0df8-dab6253532e5@riseup.net>
From: Ben Schwartz <bemasc@google.com>
Date: Mon, 18 Mar 2019 18:00:53 -0400
Message-ID: <CAHbrMsCJz8s=B9pvvKmXhe+iGUUDPhW067JabyLnXsJNMUJT8w@mail.gmail.com>
To: nusenu <nusenu-lists@riseup.net>
Cc: DoH WG <doh@ietf.org>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="00000000000087bb4405846586b4"
Archived-At: <https://mailarchive.ietf.org/arch/msg/doh/YbXMhHH67-JE7qUcjn4f6eJOpf0>
Subject: Re: [Doh] Talking to my resolver
X-BeenThere: doh@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: DNS Over HTTPS <doh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/doh>, <mailto:doh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/doh/>
List-Post: <mailto:doh@ietf.org>
List-Help: <mailto:doh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/doh>, <mailto:doh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Mar 2019 22:01:10 -0000

On Mon, Mar 18, 2019 at 5:36 PM nusenu <nusenu-lists@riseup.net> wrote:

> Martin Thomson:
> >>> But why not provide a mechanism that can do for DoT what this
> >>> does for DoH?
> >>
> >> I'd like to see that happen as well but I assume that will not be
> >> on the DoH WG since it is outside it's charter?
> >
> > I'd hate for our charter to cause us to disregard better solutions.
>
> These are encouraging words. I'd support the inclusion of a DoT
> discovery mechanisms if that is asked but I assume a discovery mechanism
> for DoT will be specified anyway, if not in this one it will be in a
> separate document.
>

DoT is currently discovered by probing port 853 on the resolver's IP
address.  Is this sufficient for your use case?


> One reason that makes me think it would be worthwhile to have a
> single document for both (DoT and DoH) is that we might end up
> with a better protocol.
>
>
> I'm taking a step back and ask two high level questions
> and answer them for myself but it would be great to hear more
> opinions.
>
> What use-cases are we aiming to cover?
>
> I assume the primary use-case here is
> "Application (or OS) wants to discover a DoH server associated with the
> current Do53 resolver".
> (also but to a less extend "web application wants to discover ...")
>
> What security properties are we aiming for?
>
> I'd like to see a protocol that is not vulnerable to man-in-the-middle
> and downgrade attacks, even if that means that use-cases that can't
> detect the IP address of the currently used resolver can not be covered.
>

An active adversary "in the middle" can fully substitute itself for a Do53
resolver without alerting the user.  Do you see an achievable defense
against downgrade attacks, or is this not part of your threat model?

Alternatively we could have a 'strict' and an 'opportunistic' discovery
> profile
> with distinct security properties to tackle all currently covered
> use-cases without weakening the security properties of the entire protocol
> for all use-cases?
> (example: "A client able to determine the resolver's IP address MUST NOT
> use the
> "DoH Servers from DNS" discovery mechanism.")
> At the very least we should prevent a temporary on-path attacker getting a
> persistent
> feed of a victim's DoH traffic as described in my other email [1].
>
> [1] https://mailarchive.ietf.org/arch/msg/doh/295yrI72xt0eSnYueiOuqVpSj4s
>
> kind regards,
> nusenu
>
>
> --
> https://twitter.com/nusenu_
> https://mastodon.social/@nusenu
>
> _______________________________________________
> Doh mailing list
> Doh@ietf.org
> https://www.ietf.org/mailman/listinfo/doh
>